Recently, one of the growing hot topics in the field of wireless network is to enable of Delay/Disruption Tolerant Networking (DTN). It aims to solve the long delay paths and unpredictable link disruptions that occur in the challenged networks. In order to maintain a safe and secure DTN model, a secure way of key distribution would be required to provide robustness from all the attacks it suffers. This paper proposes a clear and illustrative security architecture for DTN with secure key management framework to distribute the cryptographic keys to the constituted nodes in a secure way. The performance of how the cryptographic keys work and perform during a node is departed away from the network are discussed. The distributed keys use the public key cryptography to mitigate during the network attacks. Along with the key management protocol, some degree of security features can be achieved with the bundle of security protocol to rescue the network model from any attacks.
CITATION STYLE
Rajan, G., & Cho, G. (2015). Applying a security architecture with key management framework to the delay/disruption tolerant networks. International Journal of Security and Its Applications, 9(4), 327–336. https://doi.org/10.14257/ijsia.2015.9.4.30
Mendeley helps you to discover research relevant for your work.